Professional Documents
Culture Documents
Computer IX CH-5,6,7
Computer IX CH-5,6,7
Page47
CHAPTER # 5
Computer Security & Ethics
Q.1 Define computer security?
A. Computer Security:
Computer security is also known as cyber security or IT security.
Computer security is the protection of information systems from theft or
damage to the hardware, the software, and the information on them, as well
as from disruption or misdirection of the services they provide.
Q.2 Why is computer security important? Write any three reasons?
A. Importance Of Computer Security:
Computer security is important because it keeps out information
protected. It’s also important for our computer’s overall health; proper
computer security helps prevent viruses and malware, which allows programs
to run quicker and smoother. It safeguards confidential and sensitive
information. Some reasons given below for computer security:
1. TO PREVENT FROM DATA THEFT:
Data theft is act of stealing sensitive information such as bank account
details credit card information, passwords, and documents which sotred
on computers, servers, or other devices, So, prevent from data theft we
have to ensure our device security by using endpoint security, lock
down our computers, identify critical data and use authentication.
2. TO PREVENT FORM VIRUSES AND MALWARE:
Computer security is also important to protect from computer viruses
and malwares. A computer virus of malware can corrupt or delete our
sensitive data, damage our had disk and it spreads from one computer
to another using email program and others.
3. TO PROTECT PERSONAL INFORMATION:
To prevent form cyber security risk, we have to protect our personal
information. Its security is the first-time issue to protect our personal
and other information. We can keep our information secure using
antivirus software, strong password, avoid phishing emails, backup our
data etc.
Q.3 Explain the importance of computer security in daily life?
Page47
Q.13 Identify that a virus, worm, adware, spyware and malware can
spread through different ways.
A. WAYS OF VIRUS SPREAD:
There are different ways to spread virus from one device to another
device.
i. USB FLASH DISK AND CDS:
USB flash Disks are the most common media to transfer files. An
infected computer can spread a virus to a clean USB flash disk that
is inserted and likewise an infected USB can transmit the virus onto
a clean computer. Copying infected files from the USB or CD can
also infect the computer.
ii. INTERNET DOWNLOADS:
Computer viruses also spread through files or software downloads
from the internet. They can be attached to software or files that we
download. They virus come from the internet can also make our
computer accessible to hackers.
iii. COMPUTER NETWORK:
Page47
CHAPTER # 6
WEB DEVELOPMENT
Q.1 What is meant by web development?
A. WEB DEVELOPMENT:
Web development refers to building, creating and manipulating websites.
Page47
There are mainly different types of web There are four different types of hosting
servers: Proxy servers, mail servers, server: Shared, Virtual Private Server
applications servers and Lite Speed. (VPS), Dedicated Web Server, and
Cloud Hosting.
HTML ATTRIBUTES:
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
HTML attributes are used to describe the characteristics of an HTML
element in detail HTML attributes are found only in the starting tag, HTML
attributes specify various additional properties to existing HTML element.
EXAMPLE
<tag-name attribute – name = “attribute value”> content </tag-name>
<img src = “image /smiley.png “width = “30” height = “30” alt = “Smiley”>
It contains a set of tags It contains only one tag. It contains <h1> being
such as <title>, <meta>, heaviest heading and
<style>, <script>, etc. <h6> being the lightest
heading.
Q.9 Write down the functions of paragraph and line break tags?
A. PARAGRAGH TAG:
<p> tag defines a paragraph of text in a webpage. It always starts from a
new line and adds space before and after its text.
LINE BREAK TAGS
<br> tag defines a line break and starts the following content form a new
line. Unlike <p> tag, it does not add space before or after the book.
<hr> tag draws a horizontal line where it is defined. It is used to
Page47
An “ordered list” starts with the <ol> An “unordered list” starts with the
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
tag. <ul> tag.
Q.12 Define description list and nested list in HTML?
A. DESCRIPTION LIST:
Description list are used to display different terms and their description just
like in a dictionary or glossary. It is defined by <dl> tag and each of its list items is
composed of two elements: term and description. Term is defined by <dt> tag and
its description is defined by <dd> tag.
NESTED LIST:
A nested list is a list that appears an element in another list. Its mean one list
can be placed inside of another. It is useful for things like tables of contents that
contain sub – section. A nested list, for example, can be used to create an outline.
It is defined by placing the new list tag inside the <li> tag of previous list.
Q.13 How are image displayed in an HTML page?
A. Image can be inserted in an HTML documents by using <img> tag. Image’s
tag. Images are not technically inserted (copy, paste, etc). into a web page; image
is linked to web page. The <img> tag creates a holding space for the referenced
image. The <img> tag is empty, it contains attributes only, and does not have a
closing tag. </img>. It contains five attributes out which two are required and three
are optional.
Q.14 How can we apply border to an image in a web page by using html?
A. The border attributes of the IMG elements adds a border around an image.
When an image is used as a link, the browser will automatically display a border
of the image. If we want to rid the image of the border, specify 0 for the value of
the border attribute.
EXAMPLE: <img src = “a. jpg” border = “2”>
Q.16 How can we specify an alternate text for the image in html?
A. The required alt attribute specifies and alternate text for an image, if the
Page47
image cannot be display. The alt attribute provides alternative information for an
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
image if a user for some reason cannot view it (because of slow connection, an
error in the src attributes, or if the user uses a screen reader). The alt attribute is
required if the href attribute is present.
EXAMPLE: <img src = “app.jpg” alt = “Introduction”>
Q.19 What kind of HTML elements are used to display data in rows and
columns? Discuss some of its formatting features?
A. The HTML Table allows us to display the contents (like text, image, links)
in the form of rows and columns. The coordinating place of row with a column is
called a cell. These cells contain some content of the webpage. In HTML, a table is
defined by <table> tag.
FEATURES OF TABLE FORMATTING:
1. ALIGN:
It is specifying the alignment (left, right, center) of a table according to
surrounding text.
2. BGCOLOR:
The background color of the table consists of 6 – digits hexadecimal RGB
code. These color codes are prefixed by a#.
3. BORDER:
This integer attribute defines, in pixels, the size of the frame surrounding the
Page47
4. CELLPADDING:
This attribute defines the space between the content of a cell and its border,
displayed or not. The cellpadding’s length is defined in pixels.
5. C ELLSPACING:
This attribute defines the size of the space between two cells in percentage
value or pixels.
6. WIDTH:
It specifies the width of a table in pixels.
Q.20. What are the differences between rows and columns in HTML?
A. DIFFERENCES BETWEEN ROWS AND COLUMS:
ROWS COLUMS
A row is the collection of all horizontal A column is the collection of all vertical
cell of a table. cells of a table.
They spread from left to right. They spread from top to bottom.
It is defined by <tr> tag. It is defined by <td> tag.
It is placed inside the <table> tag. It is placed inside the row <tr> tag.
Q.21 What do you known about frame and explain its attributes?
A. FRAME:
A HTML element which is used to divide our browser window into
multiple sections where each section can load a separate HTML document is
called frame. It is defined by <frame> tag. Some attributes are used in HTML
frame are:
1. SRC:
The “src” attributes is used to provide the reference URL of another web
page to be displayed in this frame.
2. MARGINHEIGHT:
It defines top and bottom space of a frame.
3. MARGINDTH:
It defines left and right spaces of a frame.
4. NORESIZE:
Page47
9. Figma
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
10. CoffeeCup HTML Editor
11. Adobe XD.
Page47
CHAPTER # 7
INTRODUCTION TO DATABASE SYSTEM
Q.1 What do you known about database?
A. DATABASE:
A database is an organized collection of data, generally stored and
accessory electronically from a computer system. Database is mathematically
developed data structure which converts raw input data into meaningful
information for a particular organization. A database is composed of tables
which contains rows and columns. These rows and columns are called
records and fields respectively. Most databases contain multiple tables.
Nowadays database can be seen in every field of life, for example in
industries, health, agriculture schooling, business and banking, etc,
Q.2 Write down the uses of database?
A. USES OF DATABASE:
A database is playing a leading role of enhance the efficiency and
performances any organization. Some uses databases are:
1. They store data and provide facilities (tools) to search for specific
records in a given set of data.
2. They store special information used to manage the data. This
information called metadata and it is not shown to all the people
looking at the data.
3. They can solve cases where many users want to access (and possibly
change) the same entries of data.
4. They manage access rights (who is allowed to see the data, who can
change it).
Q.3 Define Database Management System (DBMS) with examples?
A. DATABASR MANAGEMENT SYSTEM (DBMS):
The Database Management system (DBMS) is the software that
interacts with end users, applications, and the database itself to capture and
analyze the data. Database (DBMS). A Database Management Software
Page47
Q.8 Write down the differences between DBMS and File system.
A. DIFFERENCES BETWEEN DBMS AND FILE SYSTEM:
BDMS FILE SYSTEM
DBMS is a collection of data. In File system is a collection of data. In
DBMs, the user is not required to this system, the user has to write the
write the procedures. procedures for managing the
database.
DBMS provides a good protection It is very difficult to protect a file
mechanism. under the file system.
Multiple users can access data Only one user access data at a time.
simultaneously.
It supports online access. It does not support remote
connections.
BDMS better for small, medium and It is limited only smaller data
large business. management needs.
Page47
Q.14 Define data modeling and how many components of data modeling
are there?
A. DATA MODELING:
Data modeling is a process of developing conceptual representation of
data object and their relations. Data models are used to express how the
information will be stored in database. This help to identify the most
important fields and remove the irrelevant data. Data models can be used by
database developers to create a physical database. This saves a lot of time and
efforts of developers.
TYPES OF DATA MODELING:
There are three most important components of data models.
1. Entity 2. Relationship 3. Referential Keys
Q.15 Explain entities, attributes and relationships with one example of
each?
A. ENTITIES:
In database term, an entity is an independent table and its field is
Known as attributes. All these entities have some attributes or properties that
give them their identity.
For example, in school database students, teachers, classes, and courses
offered can be considered as entities.
ATTRIBUTES:
Page47
Q.18 Write down the differences between primary key and foreign key?
A. DIFFERENCES BETWEEN PRIMARY KEY AND FOREIGN KEY:
PRIMARY KEY FOREIGN KEY
A primary key is used to uniquely A foreign key is used to define the
identify a record in an entity. connection or relationship between two
entities.
Primary Key never accept null values. A foreign key may accept multiple null
values.
We can have never accepted null values. We can have multiple foreign keys in a
Page47
COMPONENTS OF ER MODEL:
ER Design is made up of different components like entities, attribute and
relationships. There are defined symbols and shapes to represent each one of them.
Some of the shapes used to define these components are:
SYMBOLS USES
An ellipse defines an attribute of an
entity. One entity may contain multiple
attributes are defined by multiple
ellipses.
ABBREVIATIONS
CHAPTER # 7 “INTRODUCTION TO DATABASE SYSTEM”
S.R.NO ABBERVIATIONS FULL FORMS
01 DB Data base
Page47
ABBREVIATIONS
CHAPTER # 1
FUNDAMENTAL OF COMPUTER
S.No Abbreviation FULL FORMS
01 ATM Automated Teller Machine
02 IBM International Business Machine
03 ENIAC Electronic Numerical Integrator and Calculator
04 EDVAC Electronic Discrete Variable Automatic Computer
05 EDSAC Electronic Delay Storage Automatic Computer
06 UNIVAC Universal Automatic Computer
Page47
ABBREVIATIONS
CHAPTER # 2
OPERATING SYSTEM
SR.NO ABBREVIATIONS FULL FORMS
Page47
ABBREVIATIONS
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
CHAPTER # 4
DATA COMMUNICATION &COMPUTER NETWORK
SR.NO ABBERVIATIONS FULL FORMS
01 Bit Binary Digit
02 Kbps Kilo Byte
03 Bps Byte Per Second
04 SNR Signal Noise Ratio
05 UTP Unshielded Twisted Pair
06 STP Shielded Twisted Pair
07 FM Frequency Modulation
08 LCD Liquid Crystal Display
09 MODEM Modulator Demodulator
10 DSL Digital Subscriber Link
11 ISDN Integrated Services Digital Network
12 NIC Network Interface card
13 LAN Local Area Network
14 MAN Metropolitan Area Network
15 WAN Wide Area Network
16 ISO International Standard Organizations
17 IEEE Institute of Electrical and Electronic
Engineering
18 IETF International Engineering Task Manager
19 ITU International Telecommunication Union
20 ANSI American National Standard Institute
Page47
ABBREVIATIONS
CHAPTER # 5 “COMPUTER SECURITY & ETHICS”
SR.NO ABBREVIATIONS FULL FORMS
01 ATM Automated Teller Machine
02 PIN Personal Identification Number
03 IPO Intellectual property Organization
ABBREVIATIONS
CHAPTER # 6
WEB DEVELOPMENT
S.No Abbreviations Full Forms
1 WWW World wide Web
2 URL Uniform Resources Locator
3 HTML Hyper Text Markup Language
Page47
ABBREVIATIONS
CHAPTER # 7 “INTRODUCTION TO DATABASE SYSTEM”
S.R.NO ABBERVIATIONS FULL FORMS
01 DB Data base
02 NADRA National Database Registration Authority
03 DBMS Database Management System
04 SQL Structure Query Language
05 RDBMS Relational Database Management Software
06 ERM Entity Relationship Model
07 ERD Entity Relationship Diagram
CHAPTER # 3
“OFFICE AUTOMATION”
HOT KEYS
SR.NO ACTION SHORT KEYS
01 To change the margins of entire document Alt + P + M
Page47
of selected section.
Page47